Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Fresh Point of Sale Malicious Program Spotted

 

According to Forcepoint a security company, one fresh sample of PoS (point of sale) malicious program has been spotted which the company dubbed UDPoS. The malware masked like one service pack to aid LogMeIn software that facilitates remote connectivity programs, filches data from payment cards whose magnetic strips are swiped on the PoS device. In fact, any PoS malware universally steals payment card data over an expanded scale.

 

Forcepoint describes the UDPoS malware's development as nothing striking since it leaves trails after utilizing data files stored on the hard disk rather than doing its activity mostly inside memory, whilst data exfiltration as well as communication through DNS is really uncommon, while can prove pretty effective. Essentialretail.com posted this on the Web dated February 8, 2018.

 

Since the malware filches data only from magnetic strips, the indication of targets is from United States and not Europe, the country which uses PIN and Chip to protect payment cards. The possible attack points are mobile and fixed PoS terminals installed at restaurants and hotels, point out Forcepoint researchers.

 

Like distributed businesses, hotel as well as retail chains own numerous outlets operating PoS devices, and the business problem is enormous both for small and large enterprises. The latest UDPoS malicious program seems to be one fresh PoS malware family. The security investigators have named it so as it heavily utilizes DNS traffic based on UDP (user datagram protocol) for sending bulk payment card details onto the servers of online crooks controlling the malicious program.

 

Outlining that UDPoS utilizes LogMeIn themes merely for camouflaging its operations, Forcepoint having revealed its discoveries to the latter found no evidence of service else product getting exploited.

 

According to Forcepoint, any PoS terminal can believably stay infected for long time periods as well as for many enterprises, since PoS devices from legacy frequently depend on Windows XP kernel variations as well as are installed at large retailers.

 

Forcepoint researchers state they found clues of one previous Intel-themed sample that indicates UDPoS will likely evolve as operational malware's next phase and made to get increasingly successful while pick newer victims.

» SPAMfighter News - 2/16/2018

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next